Modelling Agents’ Knowledge Inductively

  • Giampaolo Bella
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1796)


This note introduces my extensions to Paulson’s “Inductive Approach” in order to reason about agents’ knowledge. First, I argue that an agent knows all the components of those messages she creates. I exploit this notion on some crypto-protocols with particular message structure. Then, I allow a new event, message reception, to occur on the network. This leads to a broad definition of agents’ knowledge, which extends the existing definition of spy’s knowledge. I will discuss strengths and weaknesses of the two models when proving session key knowledge.


Modelling Agent Computer Laboratory Computer Security Inductive Approach Message Reception 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abadi, M., Burrows, M., Kaufman, C., Lampson, B.: Authentication and Delegation with Smart-cards. DIGITAL Technical Report 67, California (1990)Google Scholar
  2. 2.
    Bella, G.: Enhancing the Inductive Approach by Message Reception. Technical Report No. 460, Cambridge University, Computer Laboratory (1999)Google Scholar
  3. 3.
    Bella, G.: Are Timestamps Worth the Effort? A Formal Treatment. Technical Report No. 427, Cambridge University, Computer Laboratory (1998)Google Scholar
  4. 4.
    Bella, G., Paulson, L.C.: Kerberos Version IV: Inductive Analysis of the Secrecy Goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 361–375. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  5. 5.
    Lowe, G.: A Hierarchy of Authentication Specifications. In: Proc. of Tenth IEEE Computer Security Foundations Workshop (1997)Google Scholar
  6. 6.
    Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6, 85–128 (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Giampaolo Bella
    • 1
  1. 1.Computer LaboratoryUniversity of CambridgeCambridgeUK

Personalised recommendations